Path-sensitive bug detection analysis of C# program illustrated by null pointer dereference
This paper proposes an approach for detecting bugs in C# programs and uses null pointer deference as the main example. The approach is based on a scalable path-sensitive analysis, which involves symbolic execution with state merging and function summary methods. Functions are analyzed in backward to...
Main Authors: | V. . Koshelev, I. . Dudina, V. . Ignatyev, A. . Borzilov |
---|---|
Format: | Article |
Language: | English |
Published: |
Ivannikov Institute for System Programming of the Russian Academy of Sciences
2018-10-01
|
Series: | Труды Института системного программирования РАН |
Subjects: | |
Online Access: | https://ispranproceedings.elpub.ru/jour/article/view/676 |
Similar Items
-
C# static analysis framework
by: V. . Koshelev, et al.
Published: (2018-10-01) -
Statically detecting buffer overflows in C/C++
by: I. . Dudina, et al.
Published: (2018-10-01) -
Inter-procedural buffer overflows detection in C/C++ source code via static analysis
by: I. . Dudina
Published: (2018-10-01) -
A static analysis tool Svace as a collection of analyzers with various complexity levels
by: A. . Borodin, et al.
Published: (2018-10-01) -
Null safety benchmarks for object initialization
by: A. V. Kogtenkov
Published: (2018-10-01)